Frequently Asked Questions

Any violation of our terms of service will result in immediate account closure without any compensation.

1. How is DeHashed Not a Hacktool?

DeHashed has many measures in place to prevent the misuse of its engine. Here are a few:

DeHashed has a leaky bucket algorithm in place to prevent the scraping of our site for any purpose. This will prevent potential unwanted malicious users from using DeHashed to create "Combo Lists".

DeHashed does not log any users exact search. However, we do keep a log of how many searches each user makes. If a user is searching for more than a set amount of accounts that may not belong to them, our account managers automatically lock the account for a period of time. If the malicious user behavior continues, the user is indefinitely barred from using our paid features, while still allowed to use our free features such as our account monitoring service.

DeHashed does not advertise as a hack tool. We make an effort to comply with all legal requirements and privacy laws. If a user wishes for their information to be removed, they can contact us and their data will be removed with no questions asked.

DeHashed does not advertise on any blackhat sites or any site that may unwantingly invite malicious users that risk abusing our search engine.

DeHashed does not focus on its userbase. We focus on on Business to Business (B2B) API sales.

Contrary to our name, we try to sway away from plaintext passwords as much as possible.

DeHashed is nothing like WeLeakinfo, LeakedSource, LeakBase, Snusbase, Indexeus, LeakHub, or Have I Been Pwned (HIBP). They are all illegal with the exception of HaveIBeenPwned, whilst Indexeus and Snus Base are somewhat of a gray area. Sites like We Leak Info, Leaked Source, Leak Base, and Leak Hub advertise as a hacktool and encourage black-hat activity.

2. Who do we Work With?

DeHashed will not disclose its customers' information, however we work with high profile breach analysis and prevention companies.

DeHashed contributes a fair amount of effort to make users aware of breaches that affect them, we even provide data to fellow breach analytic services that have a better customer outreach than ours.

3. Your Site Says You Have X Amount of Records, Yet Some Data is Not Shown.

DeHashed is a true search engine. Our data is indexed properly so search results are fast. This takes time, our indexer is currently very slow.

DeHashed has data from all corners of the internet, it's not just a hacked database search engine, but also a people search (This means a lot of whitepage databases).

DeHashed has a Breach Directory page, there you can find a list detailing most breaches existing in our search function.

DeHashed will release a tool to verify the record count, it already does exist, But we want our data to be indexed first. With this, everyone will be able to verify the exact record count.

4. How Are You Different?

DeHashed is a true search engine. We offer True wildcard. We offer Regex searches. That's right, you can use Regex in our search. We will release a tutorial soon.

We are simply faster, and have more records than any other site. That being said, we are also legal. We aren't going anywhere.

DeHashed provides live support for any issues you might run into.

We are not overpriced and do not charge for most services. Security should be free, people should not have to pay to feel safe on the internet. That is mafia-like, and we do not support that kind of thought process.

5. There Are Too Many Searches Being Returned!

Give our support page guide a read! You can disable the wildcard option and search for exact data. For the simplest way, simply add quotation marks before your search (Example: "test" instead of just: test).

6. Logs & Privacy

Our number one priority has been and will always be user security. For this reason, we do not log unnecessary information. The only things we log are: your registration email, your registration password, your registration date, and how many records you access.

DeHashed does not log which records you access, only the number of records.

DeHashed will only email our users when deemed neccessary.

7. Security

DeHashed uses state of the art security technology. This means nothing is communicated unless it is encrypted.

8. How Do I Purchase?

You can purchase by either being logged in and clicking purchase under the pricing page, or simply click on your email in the top right corner and plans will be displayed on the bottom right.